Feeds

Online ejaculation pole: shock result revealed

And the stroke average is...

7 Elements of Radically Simple OS Migration

NSFW Last September we ran a shamelessly non-IT-related piece on UK sex toy e-tailer LoveHoney's online ejaculation pole* - a frankly preposterous survey of how many strokes it took Linux programmers to achieve explosive climax when indulging in a quick five-knuckle shuffle while perusing a Natalie Portman topless sunbathing snaps website.

Well, the results are in and - although we really are ashamed of ourselves in giving this filth even more coverage - the average level of spam javelin worrying it takes the average male to go bang is...

No, that would spoil the fun. Click here to get the full low-down, including the sensational revelation that left-handers can blow their load a full two strokes sooner then their right-handed counterparts - thereby allowing them vital extra time to enjoy post-monocoital pizza.

One thing remains - we now demand that LoveHoney conduct a poll for women to establish once and for all how much petting the pink taco it takes for the earth to move. Get to it.®

Bootnote

*No emails please - we know how poll is spelt.

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?